Protecting moving trajectories with dummies

Tun Hao You, Wen Chih Peng, Wang Chien Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

104 Scopus citations

Abstract

Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in human-like trajectories, [8] shows that location privacy of mobile users can be preserved. However, by monitoring long-term movement patterns of users, the trajectories of mobile users can still be exposed. We argue that, once the trajectory of a user is identified, locations of the user is exposed. Thus, it's critical to protect the moving trajectories of mobile users in order to preserve user location privacy. We propose two schemes that generate consistent movement patterns in a long run. Guided by three parameters in user specified privacy profile, namely, short-term disclosure, long-term disclosure and distance deviation, the proposed schemes derive movement trajectories for dummies. A preliminary performance study shows that our approach is more effective than existing work in protecting moving trajectories of mobile users and their location privacy.

Original languageEnglish (US)
Title of host publicationProceedings - 8th International Conference on Mobile Data Management, MDM 2007
Pages278-282
Number of pages5
DOIs
StatePublished - 2007
Event8th International Conference on Mobile Data Management, MDM 2007 - Mannheim, Germany
Duration: May 7 2007May 11 2007

Publication series

NameProceedings - IEEE International Conference on Mobile Data Management
ISSN (Print)1551-6245

Other

Other8th International Conference on Mobile Data Management, MDM 2007
CountryGermany
CityMannheim
Period5/7/075/11/07

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint Dive into the research topics of 'Protecting moving trajectories with dummies'. Together they form a unique fingerprint.

Cite this